This paper describes a theoretical framework for inducing knowledge from incomplete data sets. The general framework can be used with any formalism based on a lattice structure. It...
: Context is the challenge for the coming years in Artificial Intelligence (AI). In the companion paper [6], we present a view of how context is considered through the literature i...
In theoretical cryptography, one formalizes the notion of an adversary's success probability being "too small to matter" by asking that it be a negligible function ...
: Determining the QoS (quality of service) of composite Web services is of crucial importance for both service providers and consumers. However, service descriptions of constituent...
Application-level protocol specifications are helpful for network security management, including intrusion detection, intrusion prevention and detecting malicious code. However, c...